
- Internet›
- Cyber Crime›
Records compromised during data breaches in Q2 2017
Distribution of personally identifiable records compromised during selected global data breaches in 2nd quarter 2017

Share of exposed records | |
---|---|
Docusign | 59% |
AllRecipes | 18% |
Zomato | 10% |
OneLogin | 7% |
Atalassian | 3% |
Bell Canada | 1% |
Students | 1% |
Fashion Fantasy | 1% |
Share of exposed records | |
---|---|
Docusign | 59% |
AllRecipes | 18% |
Zomato | 10% |
OneLogin | 7% |
Atalassian | 3% |
Bell Canada | 1% |
Students | 1% |
Fashion Fantasy | 1% |
© Statista 2019
About this statistic
Show source
Please be patient - this may take a moment
Description
Source
More information
- Show sources information
- Show publisher information
- Release date
- May 2017
- Region
- Worldwide
- Survey time period
- 2nd quarter 2017
- Special properties
- known incidents with over 1 million records
- Supplementary notes
- This excludes a number of reports impacting smaller organizations or companies that have yet to release the number of compromised users.
- Region
- Worldwide
- Survey time period
- 2nd quarter 2017
- Special properties
- known incidents with over 1 million records
- Supplementary notes
- This excludes a number of reports impacting smaller organizations or companies that have yet to release the number of compromised users.




You only have access to basic statistics.
- Instant access to 1m statistics
- Download in XLS, PDF & PNG format
- Detailed references
$49 / Month *
Corporate solution including all features.
Prices do not include sales tax.






Statista is a great source of knowledge, and pretty helpful to manage the daily work.Christof Baron
CEO, MindShare Germany
- IT and cyber security spending
- Proposed federal spending by the U.S. government on cyber security for selected government agencies during FY 2019 (in million U.S. dollars)U.S. federal government proposed cyber security spending FY 2019
- Proposed budget of the U.S. government for cyber security in FY 2017 to 2019 (in billion U.S. dollars)U.S. government: proposed cyber security spending in FY 2017-2019
- Federal government information technology (IT) expenditure in the United States from 2011 to 2019 (in billion U.S. dollars)U.S. federal government IT expenditure 2011-2019
- Federal government information technology (IT) expenditure in the United States from 2011 to 2019, by significance (in billion U.S. dollars)U.S. federal government IT expenditure 2011-2019, by significance
- Federal government information technology (IT) budget in the United States from 2015 to 2019, by department (in million U.S. dollars)U.S. President's federal government IT budget 2015-2019, by department
- Civilian CFO agency cyber security spending of the U.S. government FY 2017 (in million U.S. dollars)U.S. government: cyber security spending of selected departments 2017
- Countries with the highest commitment to cyber security based on the Global Cybersecurity Index (GCI) as of September 2016Leading countries based on global cyber security ranking (GCI) 2016
- Federal data breaches
- Share of adults in the United States who think a cyber attack on selected institutions will happen in the next five years as of May 2016 Perceptions of likelihood of cyber attacks in the U.S. in the next five years 2016
- Number of compromised data records in selected data breaches as of November 2018 (in millions)Cyber crime: biggest online data breaches 2007-2018
- Number of cyber security incident reports by federal agencies in the United States from FY 2006 to 2016Annual number of cyber incidents according to U.S. federal agencies 2006-2016
- Number of reported cyber attacks directed against selected departments and agencies of the U.S. government in FY 2017U.S. government: number of cyber security incidents 2017, by department
- Number of reported cyber attacks directed against the U.S. government in FY 2017, by attack vectorU.S. government: number of cyber security incidents 2017, by attack vector
- Number of data breaches in the United States from 2014 to 2018, by industryNumber of U.S. data breaches 2014-2018, by industry
- Distribution of data breaches in the United States from 2014 to 2018, by sectorCyber crime: distribution of breaches 2014-2018, by sector
- Distribution of records exposed due to data breaches in the United States from 2014 to 2018, by sectorCyber crime: distribution of data exposed 2014-2018, by sector
- Hacking
- Support for delaying Electoral College vote until Electors are briefed on allegations of Russian hacking, as of December 16, 2016Opinion on delaying Electoral College vote due to Russian hack December 2016
- Should the Electoral College change or withhold vote and let Congress review allegations of Russian hacking and appoint the president?Opinion on Electoral College letting Congress choose POTUS due to Russian hack 2016
- Opinion on whether Russia is responsible for DNC hack as of December 13, 2016, by party affiliationOpinion on Russian responsibility for DNC hack by party affiliation December 2016
- Opinion on why Russia hacked the DNC as of December 13, 2016, by party affiliationOpinion on why Russia hacked the DNC by party affiliation December 2016
- Online industries most targeted by phishing attacks as of 2nd quarter 2018Phishing: most targeted industry sectors 2018
- Organizations most targeted by phishing attacks in 2nd quarter 2018, by categoryPhishing: most targeted organization types 2018
- Trust
- Biggest cyber security problems facing the U.S. government according to adults in the United States as of January 2017Biggest U.S. government cyber security problems according to U.S. adults 2017
- Share of adults in the United States who think the following institutions are prepared to prevent cyber attacks as of May 2016Perceptions of U.S. government and business cyber attack preparedness 2016
- Share of adults in the United States who think the government should be able to access encrypted communications when investigating crimes as of May 2016, by age group U.S. perceptions of law enforcement having access to encrypted communications 2016
- Share of adults tech users in the United States who are confident in the ability of selected institutions to protect their data as of May 2016U.S. adult tech user trust in institutional protection of private data 2016
- Share of adults in the United States who trust selected institutions to keep their personal information secure as of January 2017U.S. adult user trust in institutional security of personal information 2017
- Most punishable types of hacking according to adults in the United States as of January 2017Severest types of hacking according to U.S. adults 2017
- On a scale of 1 to 10, much do you worry about the security of your personal data with online services from governmental agencies?U.S. online user worry about personal data security with government agencies 2017
- Leading global data breach methods 2017
- Median number of days between data breach milestones 2014-2017
- Cyber espionage: varieties of data compromised 2014
- Per capita cost for root causes of data breach in the UK in 2015
- Costs arising from data loss in the UK in 2015, by category
- Share of UK companies that use data encryption to prevent data loss 2010-2015
- Lost business costs of data breach in the UK 2010-2015
- Share of UK companies that implement manual control practices to prevent data loss
- Per capita cost of data breach in the UK 2015, by industry
- Share of UK companies that implemented perimeter controls to prevent data loss
- Root causes of data breach in the UK in 2015
- Share of UK companies that use data loss prevention solutions 2010-2015
- Ex-poste response costs of data breach in the UK from 2010-2015
- Organisational cost of data breach in the UK 2010-2015
- Per capita cost of data breach in the United Kingdom (UK) 2010-2015
- Notification costs of data breaches in the UK 2010-2015
- Share of records compromised in breaches involving servers 2004-2011
- Weekly malware events across industry verticals 2014
- Cyber espionage: malware vectors 2014
- Leading cyber crime forensics types in the U.S. 2018
- Cyber crime in India
- Cyber crime in Japan
- U.S. companies and cyber crime
- U.S. consumers and cyber crime
- U.S. government and cyber crime
- Cyber crime in Canada
- Cyber crime in Spain
- Cyber crime and cyber security in the United Kingdom (UK)
- Verizon 2018 Data Breach Investigations Report
- Protected Health Information Data Breach Report 2018
- Verizon 2017 Data Breach Investigations Report
- 2018 ITRC Data Breach Report H1 2018
- 2017 ITRC Annual Data Breach Year-End Review
- 2016 Cost of Cyber Crime Study: Global
- 2017 Cost of Cyber Crime Study: Global
- Proposed budget of the U.S. government for cyber security in FY 2017 to 2019 (in billion U.S. dollars)
- Civilian CFO agency cyber security spending of the U.S. government FY 2017 (in million U.S. dollars)
- Countries with the highest commitment to cyber security based on the Global Cybersecurity Index (GCI) as of September 2016
- Share of adults in the United States who think a cyber attack on selected institutions will happen in the next five years as of May 2016
- Number of compromised data records in selected data breaches as of November 2018 (in millions)
- Number of cyber security incident reports by federal agencies in the United States from FY 2006 to 2016
- Number of reported cyber attacks directed against selected departments and agencies of the U.S. government in FY 2017
- Number of data breaches in the United States from 2014 to 2018, by industry
- Average annual costs caused by global cyber crime as of August 2017, by industry sector (in million U.S. dollars)
- Global number of cyber security incidents in 2017, sorted by victim industry and organization size
- Biggest cyber security problems facing the U.S. government according to adults in the United States as of January 2017
- Share of adults in the United States who think the following institutions are prepared to prevent cyber attacks as of May 2016
- Share of adults in the United States who think the government should be able to access encrypted communications when investigating crimes as of May 2016, by age group
- Share of adults tech users in the United States who are confident in the ability of selected institutions to protect their data as of May 2016
- Share of adults in the United States who trust selected institutions to keep their personal information secure as of January 2017
- Most punishable types of hacking according to adults in the United States as of January 2017
- Most common action varieties in data breaches worldwide in 2017
- Varieties of data compromised within cyber espionage incidents worldwide in 2014
- Percentage of records compromised in breaches involving servers worldwide from 2004 to 2011
- Numbers of weekly malware events across selected industry verticals in 2014
- Malware installation vectors within global industrial cyber espionage incidents in 2014
- Types of investigation conducted after a cyber intrusion incident in the United States as of 2018
- Proposed federal spending by the U.S. government on cyber security for selected government agencies during FY 2019 (in million U.S. dollars)
- Federal government information technology (IT) expenditure in the United States from 2011 to 2019 (in billion U.S. dollars)
- Federal government information technology (IT) expenditure in the United States from 2011 to 2019, by significance (in billion U.S. dollars)
- Federal government information technology (IT) budget in the United States from 2015 to 2019, by department (in million U.S. dollars)
- Number of reported cyber attacks directed against the U.S. government in FY 2017, by attack vector
- Distribution of data breaches in the United States from 2014 to 2018, by sector
- Distribution of records exposed due to data breaches in the United States from 2014 to 2018, by sector
- Global industries most targeted by cyber espionage in 2017
- Support for delaying Electoral College vote until Electors are briefed on allegations of Russian hacking, as of December 16, 2016
- Should the Electoral College change or withhold vote and let Congress review allegations of Russian hacking and appoint the president?
- Opinion on whether Russia is responsible for DNC hack as of December 13, 2016, by party affiliation
- Opinion on why Russia hacked the DNC as of December 13, 2016, by party affiliation
- Online industries most targeted by phishing attacks as of 2nd quarter 2018
- Organizations most targeted by phishing attacks in 2nd quarter 2018, by category
- On a scale of 1 to 10, much do you worry about the security of your personal data with online services from governmental agencies?
- Median time period between intrusion, detection, and containment of industrial cyber attacks worldwide from 2014 to 2017 (in days)
- Average per capita cost for root causes of the data breach in the United Kingdom (UK) in 2015 (in GBP)
- Distribution of costs arising from data loss in the United Kingdom (UK) in 2015, by category
- Share of companies that use data encryption to prevent loss of data in the United Kingdom (UK) from 2010 to 2015
- Average lost business costs of data breach in the United Kingdom (UK) from 2010 to 2015 (in million GBP)
- Share of companies that implement manual control practices to prevent loss of data in the United Kingdom (UK) from 2010 to 2015
- Average per capita cost of data breach in the United Kingdom (UK) in 2015, by industry (in GBP)
- Share of companies that implement strengthening of perimeter controls to prevent loss of data in the United Kingdom (UK) from 2010 to 2015
- Distribution of the root causes of data breach in the United Kingdom (UK) in 2015
- Share of companies that implement data loss prevention solutions to prevent loss of data in the United Kingdom (UK) from 2010 to 2015
- The average ex-poste response costs of data breach in the United Kingdom (UK) from 2010 to 2015 (in million GBP)
- Average organisational cost of data breach in the United Kingdom (UK) from 2010 to 2015 (in million GBP)
- Average per capita cost of data breach in the United Kingdom (UK) from 2010 to 2015 (in GBP)
- Average notification costs of data breaches in the United Kingdom (UK) from 2010 to 2015 (in million GBP)
Statista offers dossiers and reports on over 170 industries. With Statista you are always able to make informed decisions and boost your work efficiency.
Internet & Telecommunications
- Social Media
- E-Commerce
- Online Video & Entertainment
- Advertising & Marketing
Consumer Goods & FMCG
- Alcoholic Beverages
- Cleaning Products
- Cosmetics & Personal Care
- Food & Nutrition
Retail & Trade
- Health & Hygiene
- International Trade
- Shopping Behavior
- Sports & Leisure
Travel, Tourism & Hospitality
- Business Travel
- Leisure Travel
- Accomodation
- Restaurants
Society
- Demographics
- Economy
- Education & Science
- Politics & Government
Transportation & Logistics
- Aviation
- Rail Transport
- Vehicles & Road Traffic
- Water Transport
Register in seconds and access exclusive features.
Basic Account |
Instant Access
Premium Account | ||
---|---|---|---|
Our servicesClick the question mark for further information | Free |
$49 per month* | |
Basic statistics | |||
Premium statistics | |||
Graph download
| |||
Download PDF | |||
Excel download
| |||
Register | Purchase now |
This feature is limited to our corporate solutions.
Please contact us to get started with full access to dossiers, forecasts, studies and international data.

Updates on eCommerce, Digital Media, eTravel, eServices and more
- Market figures for 2018 to 2023
- Company and startup profiles
- User demographics

U.S. coal production has steadily declined in the past decade, but has been in the news in recent years due to President Trump's desire to revitalize the industry. This document provides an overview of the key figures, leading companies, and the employment trends in the U.S. coal mining industry.

This new export feature offers
- Structured graphical representation of the data
- Tailored target group analysis
- Option for further processing

The Polish e-commerce market is one of the fastest developing e-commerce markets in Europe. The latest data for Poland is presented in this dossier.

Plastic waste is an issue of global concern. Since China banned the import of recycled plastic, the U.S. has had to make adjustments to its management of plastic waste. This dossier provides an overview of plastic waste in the U.S.

This dossier provides an overview of hedge funds worldwide. Global hedge fund assets, performance, investors, and other topics are highlighted.

The Outdoor Advertising Association of America covers amongst others
- Number of billboards
- Outdoor advertising revenue
- Number of out-of-home displays

Find data, perceptions & more about
- Economic consequences
- Impact on the labor market
- A second referendum

Understand the recent developments in the Spanish eCommerce market!
- URL-related revenues
- Relevant online store KPIs
- eCommerce-related contacts

- Extended statistical dossier
- Insights, explanations & interpretations
- Challenges of the digital future

eCommerce is rapidly becoming a part of the Latin American shopping culture. The dossier includes data on
- Regional online shopping events
- Events by country

The outline of potential impacts of Brexit on UK industries has been updated in the UK Industry Reports.

Italian enterprises invest significantly in digital marketing. Find out about
- Relevant aspects & KPIs
- New trends
- Different strategies

Statista European Football Benchmark
- The big 5 European leagues
- All about the clubs & fans
- Sponsors & how they fit in

What are online shoppers' payment preferences around the world?
- Data on all payment methods
- Analysis for 50 countries
- Forecasts up to 2023

The kingdom of Saudi Arabia has faced political challenges.
- Perceptions & trade information
- Conflicts with Yemen, Iran, Qatar & Turkey
We use cookies to personalize contents and ads, offer social media features, and analyze access to our website. In your browser settings you can configure or disable this, respectively, and can delete any already placed cookies. For details, please see your browser’s Help section (by pressing F1). Please see our privacy statement for details about how we use data.